Tesla Model 3 Will Be The Main Object In The Upcoming Hacker Competition
Indira Datta - Jan 16, 2019
In the Pwn2Own competition this year, the Tesla Model 3 will become the first and only participant in the automotive category.
- Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
- Hackers Compromised Camera Systems In Tesla Factories
- Tesla Reportedly Makes More Profit This Year From Bitcoin Than Car Sales In 2020
The Tesla Model 3 will become one of the targets for hackers to search for vulnerabilities in the upcoming Pwn2Own competition. This is a global competition, for those who research about network security. Hackers will compete and make money by using their talents to discover new vulnerabilities in today's widely used programs.
The organizer of the competition has teamed up with Tesla to make the Model 3 one of the most challenging targets for hackers this year. Plus, the winner of the automotive category will be rewarded with a Tesla Model 3.
The winner will also be rewarded with a Tesla Model 3
This year is the first year a car is literally included in the Pwn2Own competition. This is also an opportunity to see Tesla's determination in digital security. Tesla's software director, David Lau, said the partnership between the car manufacturing company and the network security research community is an invaluable event for the company. He said he was looking forward to the search and discovery from the Pwn2Own competition so that the company could learn from them and improve the quality of its product.
Tesla is the first cars to become an object to attack in the competition
Tesla had a bonus program for those who discover their product security flaws since 2014. Other famous car makers such as Fiat Chrysler and General Motors have also implemented similar programs. In 2015, Tesla was a popular objective of hackers to attack. At that time, researchers could infiltrate the Model S's information display and instrument cluster, but that did not affect the functioning of the car.
The Pwn2Own contest often focuses on software, and recently they have put up an impressive series of browser hacks. Four years ago, one of the researchers who participated in the competition brought home $225,000 for the discovery of three vulnerabilities in the world's most famous browsers including Safari, Chrome and Internet Explorer.
Featured Stories

ICT News - Feb 26, 2025
Elon Musk's Federal Workforce Overhaul: AI Takes the Helm

ICT News - Feb 26, 2025
Will AI Kill Coding Jobs? The Truth Might Surprise You

ICT News - Feb 25, 2025
Not Radiation: What Is Causing the Strange Genetic Evolution of Chernobyl’s Dogs?

ICT News - Feb 25, 2025
Google to Phase Out SMS-Based Authentication Codes

ICT News - May 17, 2022
3 Reasons your privacy gets compromised online

ICT News - May 11, 2022
Apple Devices For Sale

ICT News - Apr 12, 2022
Pin-Up Review India 2022

ICT News - Mar 29, 2022
Choosing between a shared and a dedicated server for gaming

ICT News - Mar 18, 2022
How The Internet Came Into Being

ICT News - Mar 17, 2022
0 Comments
Sort by Newest | Popular